This article is contributed. See the original author and article here.
Microsoft has been on a journey to harness the power of artificial intelligence to help security teams scale more effectively. Microsoft 365 Defender correlates millions of signals across endpoints, identities, emails, collaboration tools, and SaaS apps to identify active attacks and compromised assets in an organization’s environment. Last year, we introduced automatic attack disruption, which uses these correlated insights and powerful AI models to stop some of the most sophisticated attack techniques while in progress to limit lateral movement and damage.
Today, we are excited to announce the expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.
AiTM attacks are a widespread and can pose a major risk to organizations. We are observing a rising trend in the availability of adversary-in-the-middle (AiTM) phishing kits for purchase or rent, with our data showing that over organizations have already been attacked in 2023.
During AiTM attacks (Figure 1), a phished user interacts with an impersonated site created by the attacker. This allows the attacker to intercept credentials and session cookies and bypass multifactor authentication (MFA), which can then be used to initiate other attacks such as BEC and credential harvesting.
Automatic attack disruption does not require any pre-configuration by the SOC team. Instead, it’s built in as a capability in Microsoft’s XDR.
How Microsoft’s XDR automatically contains AiTM attacks
Similarly to attack disruption of BEC and human-operated ransomware attacks, the goal is to contain the attack as early as possible while it is active in an organization’s environment and reduce its potential damage to the organization. AiTM attack disruption works as follows:
- High-confidence identification of an AiTM attack based on multiple, correlated Microsoft 365 Defender signals.
- Automatic response is triggered that disables the compromised user account in Active Directory and Azure Active Directory.
- The stolen session cookie will be automatically revoked, preventing the attacker from using it for additional malicious activity.
To ensure SOC teams have full control, they can configure automatic attack disruption and easily revert any action from the Microsoft 365 Defender portal. See our documentation for more details.
Get started
- Make sure your organization fulfills the Microsoft 365 Defender pre-requisites
- Connect Microsoft Defender for Cloud Apps to Microsoft 365.
- Deploy Defender for Endpoint. A free trial is available here.
- Deploy Microsoft Defender for Identity. You can start a free trial here.
Learn more
- Check out our documentation to learn more about Microsoft 365 Defender attack disruption prerequisites, available controls, and indications.
- Learn more about other scenarios supported by automatic attack disruption
- Watch the video from our announcement at Microsoft Ignite.
- Check out our research on AiTM phishing sites as entry point to further financial fraud
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments